Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Security Apple Hardware

Apple Claims 'Most Significant Upgrade to Memory Safety' in OS History (apple.com) 39

"There has never been a successful, widespread malware attack against iPhone," notes Apple's security blog, pointing out that "The only system-level iOS attacks we observe in the wild come from mercenary spyware... historically associated with state actors and [using] exploit chains that cost millions of dollars..."

But they're doing something about it — this week announcing a new always-on memory-safety protection in the iPhone 17 lineup and iPhone Air (including the kernel and over 70 userland processes)... Known mercenary spyware chains used against iOS share a common denominator with those targeting Windows and Android: they exploit memory safety vulnerabilities, which are interchangeable, powerful, and exist throughout the industry... For Apple, improving memory safety is a broad effort that includes developing with safe languages and deploying mitigations at scale...

Our analysis found that, when employed as a real-time defensive measure, the original Arm Memory Tagging Extension (MTE) release exhibited weaknesses that were unacceptable to us, and we worked with Arm to address these shortcomings in the new Enhanced Memory Tagging Extension (EMTE) specification, released in 2022. More importantly, our analysis showed that while EMTE had great potential as specified, a rigorous implementation with deep hardware and operating system support could be a breakthrough that produces an extraordinary new security mechanism.... Ultimately, we determined that to deliver truly best-in-class memory safety, we would carry out a massive engineering effort spanning all of Apple — including updates to Apple silicon, our operating systems, and our software frameworks. This effort, together with our highly successful secure memory allocator work, would transform MTE from a helpful debugging tool into a groundbreaking new security feature.

Today we're introducing the culmination of this effort: Memory Integrity Enforcement (MIE), our comprehensive memory safety defense for Apple platforms. Memory Integrity Enforcement is built on the robust foundation provided by our secure memory allocators, coupled with Enhanced Memory Tagging Extension (EMTE) in synchronous mode, and supported by extensive Tag Confidentiality Enforcement policies. MIE is built right into Apple hardware and software in all models of iPhone 17 and iPhone Air and offers unparalleled, always-on memory safety protection for our key attack surfaces including the kernel, while maintaining the power and performance that users expect. In addition, we're making EMTE available to all Apple developers in Xcode as part of the new Enhanced Security feature that we released earlier this year during WWDC...

Based on our evaluations pitting Memory Integrity Enforcement against exceptionally sophisticated mercenary spyware attacks from the last three years, we believe MIE will make exploit chains significantly more expensive and difficult to develop and maintain, disrupt many of the most effective exploitation techniques from the last 25 years, and completely redefine the landscape of memory safety for Apple products. Because of how dramatically it reduces an attacker's ability to exploit memory corruption vulnerabilities on our devices, we believe Memory Integrity Enforcement represents the most significant upgrade to memory safety in the history of consumer operating systems.

Apple Claims 'Most Significant Upgrade to Memory Safety' in OS History

Comments Filter:
  • by SeaFox ( 739806 ) on Sunday September 14, 2025 @06:36PM (#65659486)

    The exploit chain does not cost millions of dollars to execute. It's simply the cost to buy the information from the right people. That's like spending four figures for a set of build plans for a coffee table, making the table, and then claiming the coffee table is worth thousands of dollars.

    Information can be leaked or "rediscovered" by anyone not trying to run a spyware business and lower that barrier to entry significantly.

    • I guess the weakness in that analogy is that the real coffee table is a different thing than it's plan, whereas software is both the plan and the thing it describes.
    • by alvinrod ( 889928 ) on Sunday September 14, 2025 @06:46PM (#65659500)
      I think the point is that making exploits near impossible for an individual actor to discover means only well funded organizations or nations will be able to afford being in the business. State actors are a lot less likely to make vulnerabilities widespread like mercenary actors. That doesn't save everyone from exploits, but it does make the average user less likely to be the target.

      The real question is how much of a performance tradeoff is this or if there's some other catch.
    • by tlhIngan ( 30335 ) <.slashdot. .at. .worf.net.> on Sunday September 14, 2025 @07:11PM (#65659524)

      Some companies don't sell you the information. They actually make you buy access to the exploit.

      Think companies like Cellebrite - their most advanced hacks cost millions per use - you provide them with the details on how to get at the victim (e.g., phone number) and they deploy their attack on that phone and provide a gateway to access it.

      They also sell a box you can use to break in via the USB port, and they charge anywhere from $100K to a million dollars to break into one unit - you buy the license to break into one phone.

      They're not selling their exploit chain to anyone - they're keeping it a secret and selling you the effects of that for millions of dollars. Once it's sold it's worthless because like a secret once you tell someone else, it's likely to leak out.

    • by shilly ( 142940 )

      The claim wasn’t “millions of dollars to execute”. The claim was that the exploits cost millions of dollars. It’s pretty obvious that the bulk of that cost is development and testing.

    • by mccrew ( 62494 )
      Well, strictly speaking, isn't four figures already thousands of dollars?
  • If you ignore *those* exploits, we're perfectly secure!

  • Bet on the hackers (Score:4, Insightful)

    by seichert ( 8292 ) * on Sunday September 14, 2025 @07:31PM (#65659544)
    How long until they crack this new thing? 6 months? 1 year?
    • Well, I suppose in the abstract that "someday" is probably correct. But the hackers have had 18 years, to very limited success.

    • Not too long. It's defense in depth; it's not meant to be outright impenetrable, just very (very) hard to get through.

      Someone with enough drive, enough time, and enough resources will eventually put together an exploit chain that doesn't require an invalid tagged memory access. But if that raises the manpower requirement by 10-fold (to pull a number out of my ass), then it makes it that much more expensive to attack a phone. At some point, the Apple juice won't be worth the squeeze.

  • History (Score:5, Interesting)

    by cstacy ( 534252 ) on Sunday September 14, 2025 @07:40PM (#65659556)

    The Lisp Machine operating system, ca 1977, was memory safe. It was written in Lisp, and all memory accesses were run-time type checked. Incorrect accesses, such as data type mismatch, or array bounds, were not possible on the system. However, this was implemented in hardware: it was a tagged architecture where the CPU did the type checking on every instruction in conjunction with the hardware type bits in the memory cells. (Low level software in the implementation refined the type check/dispatch on hardware traps, outside the most primitive types defined in the hardware.)

    People should be wary of "IN HISTORY" claims, as they are usually ignorant, especially when unqualified.

    • Re: (Score:3, Insightful)

      Perhaps you should try to read the article and learn Rust before commenting? Rust and CPU level memory exploits targets different class of vulnerabilities. Rust make it easy to write system level safely especially for temporal and spacial memory safety at code level. It not just help in security but also make your programs much more stable by avoid the issues in the first place. Those Apple/ARM CPU level enhancement are more like detecting and stopping the attack when it happens, it doesn't avoid/prevent
      • by vyvepe ( 809573 )

        BTW i still don't understand what's with all the rust hate?

        This is from programmers who know C or C++ and are lazy to learn something new. They bash Rust since it is the most viable safe option for domains where C/C++ is used. Part of the "hate" is also that Rust has ownership type system. It is more restrictive than "normal" type system v C/C++. It is harder to use especially if you do not have prior experience with "limiting" languages like e.g. Haskell or Clean.

      • BTW i still don't understand what's with all the rust hate? There are so many programming languages out there. Each have a different purpose, use the right tool for the job, don't be obsessive with a single tool.

        To me, the hate on Rust, is about irrevocable change. Once accepted, even if later rejected, you can never go back to what was before. At best, you can start something new, in the spirit of what was. After so much change "what was" hasn't kept up, while not being maintained. You don't see many development choices willing to sacrifice progress, to dust of obsolescence. You could distill this further, to forecasting the direction a change will bring. The change "before you" may not be so bad; but the aftermat

  • by Anonymous Coward

    "There has never been a successful, widespread malware attack against iPhone,"

    Bullshit. **cough** Israel's "Pegasus" **cough**

    Hell, when Edward Snowden warned that even when you turn off your iPhone, it can be remotely turned back on again by Five Eyes.

    • by Zak3056 ( 69287 )

      "There has never been a successful, widespread malware attack against iPhone,"

      Bullshit. **cough** Israel's "Pegasus" **cough**

      I agree that the claim is eye-roll inducing, but you could have at least read the next sentence before replying with the exact thing that it references.

      • "There has never been a successful, widespread malware attack against iPhone,"

        Bullshit. **cough** Israel's "Pegasus" **cough**

        I agree that the claim is eye-roll inducing, but you could have at least read the next sentence before replying with the exact thing that it references.

        Would you call Pegasus "Widespread"?

        And, IIRC, Apple promptly countered that, and a lot of other Grabby State bullshit, with their Enhanced Data Protection ("Lockdown Mode"), and improvements to its BlastDoor anti-infiltration system.

        https://m.economictimes.com/ne... [economictimes.com]

  • It is only about 20 years old now...

  • Can this stop the kind of spyware and exploitation tools that are used by by law enforcement agencies, intelligence agencies and the sort of "secret police" dictatorships use to suppress dissent?

    • by Anonymous Coward

      the sort of "secret police" dictatorships use to suppress dissent?

      Are you talking about masked ICE agents?

    • Can this stop the kind of spyware and exploitation tools that are used by by law enforcement agencies, intelligence agencies and the sort of "secret police" dictatorships use to suppress dissent?

      That sounds like exactly the type of exploitative efforts Apple is trying to thwart with MIE.

    • Maybe? Wouldn't that depend on how those tools work?
  • Just to name a few "hold my beer Imma replace C" languages: Ada, Modula-2, Eiffel, Java, C#, D, Cyclone, Sing#, ATS, Go, Rust, Swift, Zig, NIM, Crystal, V, Carbon, Odin, Jai, Beef, C3, Jiyu, Checked C, CCured, Oberon, Occam, Euclid.

    I just want to rub in that this safetysm never works (no matter how much you cry or insult & disrespect real work-a-day coders), has never replaced C, won't replace C, and looks pretty silly in light of all the failures. Academic failures being especially notable and laugh
  • by ledow ( 319597 ) on Tuesday September 16, 2025 @04:11AM (#65662678) Homepage

    DEP will save us all from malware
    ASLR will save us all from malware ...
    *insert 20 years of the same* ...
    MTE will save us all from malware
    EMTE will save us all from malware

"Thank heaven for startups; without them we'd never have any advances." -- Seymour Cray

Working...